Analysis
-
max time kernel
123s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
19-05-2024 10:30
Static task
static1
Behavioral task
behavioral1
Sample
5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe
Resource
win7-20231129-en
General
-
Target
5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe
-
Size
176KB
-
MD5
0e8acf4f2931765ede72461518632120
-
SHA1
f5d5c4b54584014c1c5d6c8b7f936e286b2d86b1
-
SHA256
5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e
-
SHA512
99e8819ae3ef4a27de5a1faab97407e90f4a2f67b9ab5228a3c79dd6e6fb2ab0bc0041e77134f3fe6820557d1c063378227bbc47d09433fa0bb5a28bf43ae8a3
-
SSDEEP
3072:kVJvcLqR7QAJJ+JwBVWWvMaRDr0td4LVXA:ZLq1nvRDr+d4JA
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
Processes:
5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe -
Processes:
5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe -
Processes:
5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe -
Executes dropped EXE 3 IoCs
Processes:
Fun.exeSVIQ.EXEdc.exepid process 2588 Fun.exe 2728 SVIQ.EXE 2512 dc.exe -
Loads dropped DLL 2 IoCs
Processes:
5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exepid process 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe -
Processes:
resource yara_rule behavioral1/memory/1988-2-0x0000000002660000-0x00000000036EE000-memory.dmp upx behavioral1/memory/1988-9-0x0000000002660000-0x00000000036EE000-memory.dmp upx behavioral1/memory/1988-18-0x0000000002660000-0x00000000036EE000-memory.dmp upx behavioral1/memory/1988-21-0x0000000002660000-0x00000000036EE000-memory.dmp upx behavioral1/memory/1988-34-0x0000000002660000-0x00000000036EE000-memory.dmp upx behavioral1/memory/1988-20-0x0000000002660000-0x00000000036EE000-memory.dmp upx behavioral1/memory/1988-6-0x0000000002660000-0x00000000036EE000-memory.dmp upx behavioral1/memory/1988-19-0x0000000002660000-0x00000000036EE000-memory.dmp upx behavioral1/memory/1988-11-0x0000000002660000-0x00000000036EE000-memory.dmp upx behavioral1/memory/1988-8-0x0000000002660000-0x00000000036EE000-memory.dmp upx behavioral1/memory/1988-5-0x0000000002660000-0x00000000036EE000-memory.dmp upx behavioral1/memory/1988-81-0x0000000002660000-0x00000000036EE000-memory.dmp upx behavioral1/memory/1988-82-0x0000000002660000-0x00000000036EE000-memory.dmp upx behavioral1/memory/1988-83-0x0000000002660000-0x00000000036EE000-memory.dmp upx behavioral1/memory/1988-85-0x0000000002660000-0x00000000036EE000-memory.dmp upx behavioral1/memory/1988-86-0x0000000002660000-0x00000000036EE000-memory.dmp upx behavioral1/memory/1988-88-0x0000000002660000-0x00000000036EE000-memory.dmp upx behavioral1/memory/1988-90-0x0000000002660000-0x00000000036EE000-memory.dmp upx behavioral1/memory/1988-91-0x0000000002660000-0x00000000036EE000-memory.dmp upx behavioral1/memory/1988-93-0x0000000002660000-0x00000000036EE000-memory.dmp upx behavioral1/memory/1988-120-0x0000000002660000-0x00000000036EE000-memory.dmp upx behavioral1/memory/1988-121-0x0000000002660000-0x00000000036EE000-memory.dmp upx behavioral1/memory/1988-122-0x0000000002660000-0x00000000036EE000-memory.dmp upx -
Processes:
5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe -
Adds Run key to start application 2 TTPs 12 IoCs
Processes:
Fun.exeSVIQ.EXE5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exedc.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\dc2k5 = "C:\\WINDOWS\\SVIQ.EXE" Fun.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\dc2k5 = "C:\\WINDOWS\\SVIQ.EXE" SVIQ.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\Fun = "C:\\WINDOWS\\system\\Fun.exe" Fun.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\dc = "C:\\WINDOWS\\dc.exe" Fun.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\dc = "C:\\WINDOWS\\dc.exe" SVIQ.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\dc2k5 = "C:\\WINDOWS\\SVIQ.EXE" 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\dc2k5 = "C:\\WINDOWS\\SVIQ.EXE" dc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\Fun = "C:\\WINDOWS\\system\\Fun.exe" 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\dc = "C:\\WINDOWS\\dc.exe" 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\Fun = "C:\\WINDOWS\\system\\Fun.exe" SVIQ.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\Fun = "C:\\WINDOWS\\system\\Fun.exe" dc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\dc = "C:\\WINDOWS\\dc.exe" dc.exe -
Processes:
5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exedescription ioc process File opened (read-only) \??\I: 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe File opened (read-only) \??\Q: 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe File opened (read-only) \??\R: 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe File opened (read-only) \??\S: 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe File opened (read-only) \??\T: 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe File opened (read-only) \??\Z: 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe File opened (read-only) \??\H: 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe File opened (read-only) \??\L: 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe File opened (read-only) \??\U: 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe File opened (read-only) \??\W: 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe File opened (read-only) \??\Y: 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe File opened (read-only) \??\E: 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe File opened (read-only) \??\G: 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe File opened (read-only) \??\J: 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe File opened (read-only) \??\M: 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe File opened (read-only) \??\O: 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe File opened (read-only) \??\X: 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe File opened (read-only) \??\K: 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe File opened (read-only) \??\N: 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe File opened (read-only) \??\P: 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe File opened (read-only) \??\V: 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exedescription ioc process File opened for modification F:\autorun.inf 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe File opened for modification C:\autorun.inf 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe -
Drops file in Program Files directory 5 IoCs
Processes:
5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7z.exe 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zFM.exe 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zG.exe 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe File opened for modification C:\PROGRAM FILES\7-ZIP\Uninstall.exe 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe -
Drops file in Windows directory 21 IoCs
Processes:
5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exedc.exeFun.exeSVIQ.EXEdescription ioc process File created C:\WINDOWS\system\Fun.exe 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe File opened for modification C:\WINDOWS\system\Fun.exe 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe File created C:\WINDOWS\system\Fun.exe dc.exe File created C:\WINDOWS\SVIQ.EXE dc.exe File opened for modification C:\WINDOWS\dc.exe dc.exe File opened for modification C:\WINDOWS\dc.exe 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe File created C:\WINDOWS\SVIQ.EXE 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe File opened for modification C:\WINDOWS\SVIQ.EXE 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe File created C:\WINDOWS\system\Fun.exe Fun.exe File opened for modification C:\WINDOWS\dc.exe Fun.exe File created C:\WINDOWS\SVIQ.EXE SVIQ.EXE File opened for modification C:\WINDOWS\system\Fun.exe Fun.exe File opened for modification C:\WINDOWS\SVIQ.exe SVIQ.EXE File opened for modification C:\Windows\SYSTEM.INI 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe File created C:\WINDOWS\dc.exe 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe File created C:\WINDOWS\system\Fun.exe SVIQ.EXE File opened for modification C:\WINDOWS\SVIQ.EXE Fun.exe File opened for modification C:\WINDOWS\dc.exe SVIQ.EXE File created C:\WINDOWS\dc.exe dc.exe File opened for modification C:\WINDOWS\system\Fun.exe SVIQ.EXE File opened for modification C:\WINDOWS\system\Fun.exe dc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exeFun.exeSVIQ.EXEdc.exepid process 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe 2588 Fun.exe 2728 SVIQ.EXE 2512 dc.exe 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe 2588 Fun.exe 2728 SVIQ.EXE 2512 dc.exe 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe 2588 Fun.exe 2728 SVIQ.EXE 2512 dc.exe 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe 2588 Fun.exe 2728 SVIQ.EXE 2512 dc.exe 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe 2588 Fun.exe 2728 SVIQ.EXE 2512 dc.exe 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe 2588 Fun.exe 2728 SVIQ.EXE 2512 dc.exe 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe 2588 Fun.exe 2728 SVIQ.EXE 2512 dc.exe 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe 2588 Fun.exe 2728 SVIQ.EXE 2512 dc.exe 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe 2588 Fun.exe 2728 SVIQ.EXE 2512 dc.exe 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe 2588 Fun.exe 2728 SVIQ.EXE 2512 dc.exe 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe 2588 Fun.exe 2728 SVIQ.EXE 2512 dc.exe 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe 2588 Fun.exe 2728 SVIQ.EXE 2512 dc.exe 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe 2588 Fun.exe 2728 SVIQ.EXE 2512 dc.exe 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe 2588 Fun.exe 2728 SVIQ.EXE 2512 dc.exe 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe 2588 Fun.exe 2728 SVIQ.EXE 2512 dc.exe 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe -
Suspicious use of AdjustPrivilegeToken 33 IoCs
Processes:
5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exedescription pid process Token: SeDebugPrivilege 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Token: SeDebugPrivilege 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Token: SeDebugPrivilege 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Token: SeDebugPrivilege 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Token: SeDebugPrivilege 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Token: SeDebugPrivilege 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Token: SeDebugPrivilege 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Token: SeDebugPrivilege 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Token: SeDebugPrivilege 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Token: SeDebugPrivilege 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Token: SeDebugPrivilege 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Token: SeDebugPrivilege 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Token: SeDebugPrivilege 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Token: SeDebugPrivilege 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Token: SeDebugPrivilege 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Token: SeDebugPrivilege 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Token: SeDebugPrivilege 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Token: SeDebugPrivilege 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Token: SeDebugPrivilege 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Token: SeDebugPrivilege 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Token: SeDebugPrivilege 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Token: SeDebugPrivilege 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Token: SeDebugPrivilege 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Token: SeDebugPrivilege 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Token: SeDebugPrivilege 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Token: SeDebugPrivilege 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Token: SeDebugPrivilege 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Token: SeDebugPrivilege 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Token: SeDebugPrivilege 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Token: SeDebugPrivilege 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Token: SeDebugPrivilege 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Token: SeDebugPrivilege 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Token: SeDebugPrivilege 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exeFun.exeSVIQ.EXEdc.exepid process 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe 2588 Fun.exe 2588 Fun.exe 2728 SVIQ.EXE 2728 SVIQ.EXE 2512 dc.exe 2512 dc.exe -
Suspicious use of WriteProcessMemory 55 IoCs
Processes:
5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exeFun.exedescription pid process target process PID 1988 wrote to memory of 1124 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe taskhost.exe PID 1988 wrote to memory of 1228 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Dwm.exe PID 1988 wrote to memory of 1260 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Explorer.EXE PID 1988 wrote to memory of 2320 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe DllHost.exe PID 1988 wrote to memory of 2588 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Fun.exe PID 1988 wrote to memory of 2588 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Fun.exe PID 1988 wrote to memory of 2588 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Fun.exe PID 1988 wrote to memory of 2588 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Fun.exe PID 2588 wrote to memory of 2728 2588 Fun.exe SVIQ.EXE PID 2588 wrote to memory of 2728 2588 Fun.exe SVIQ.EXE PID 2588 wrote to memory of 2728 2588 Fun.exe SVIQ.EXE PID 2588 wrote to memory of 2728 2588 Fun.exe SVIQ.EXE PID 1988 wrote to memory of 2512 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe dc.exe PID 1988 wrote to memory of 2512 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe dc.exe PID 1988 wrote to memory of 2512 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe dc.exe PID 1988 wrote to memory of 2512 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe dc.exe PID 1988 wrote to memory of 1124 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe taskhost.exe PID 1988 wrote to memory of 1228 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Dwm.exe PID 1988 wrote to memory of 1260 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Explorer.EXE PID 1988 wrote to memory of 2588 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Fun.exe PID 1988 wrote to memory of 2588 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Fun.exe PID 1988 wrote to memory of 2728 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe SVIQ.EXE PID 1988 wrote to memory of 2728 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe SVIQ.EXE PID 1988 wrote to memory of 2512 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe dc.exe PID 1988 wrote to memory of 2512 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe dc.exe PID 1988 wrote to memory of 1124 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe taskhost.exe PID 1988 wrote to memory of 1228 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Dwm.exe PID 1988 wrote to memory of 1260 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Explorer.EXE PID 1988 wrote to memory of 1124 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe taskhost.exe PID 1988 wrote to memory of 1228 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Dwm.exe PID 1988 wrote to memory of 1260 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Explorer.EXE PID 1988 wrote to memory of 1124 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe taskhost.exe PID 1988 wrote to memory of 1228 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Dwm.exe PID 1988 wrote to memory of 1260 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Explorer.EXE PID 1988 wrote to memory of 1124 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe taskhost.exe PID 1988 wrote to memory of 1228 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Dwm.exe PID 1988 wrote to memory of 1260 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Explorer.EXE PID 1988 wrote to memory of 1124 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe taskhost.exe PID 1988 wrote to memory of 1228 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Dwm.exe PID 1988 wrote to memory of 1260 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Explorer.EXE PID 1988 wrote to memory of 1124 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe taskhost.exe PID 1988 wrote to memory of 1228 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Dwm.exe PID 1988 wrote to memory of 1260 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Explorer.EXE PID 1988 wrote to memory of 1124 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe taskhost.exe PID 1988 wrote to memory of 1228 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Dwm.exe PID 1988 wrote to memory of 1260 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Explorer.EXE PID 1988 wrote to memory of 1124 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe taskhost.exe PID 1988 wrote to memory of 1228 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Dwm.exe PID 1988 wrote to memory of 1260 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Explorer.EXE PID 1988 wrote to memory of 1124 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe taskhost.exe PID 1988 wrote to memory of 1228 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Dwm.exe PID 1988 wrote to memory of 1260 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Explorer.EXE PID 1988 wrote to memory of 1124 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe taskhost.exe PID 1988 wrote to memory of 1228 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Dwm.exe PID 1988 wrote to memory of 1260 1988 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe Explorer.EXE -
System policy modification 1 TTPs 1 IoCs
Processes:
5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1124
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1228
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe"C:\Users\Admin\AppData\Local\Temp\5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1988 -
C:\WINDOWS\system\Fun.exeC:\WINDOWS\system\Fun.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\WINDOWS\SVIQ.EXEC:\WINDOWS\SVIQ.EXE4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2728
-
-
-
C:\WINDOWS\dc.exeC:\WINDOWS\dc.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2512
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2320
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD50e8acf4f2931765ede72461518632120
SHA1f5d5c4b54584014c1c5d6c8b7f936e286b2d86b1
SHA2565fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e
SHA51299e8819ae3ef4a27de5a1faab97407e90f4a2f67b9ab5228a3c79dd6e6fb2ab0bc0041e77134f3fe6820557d1c063378227bbc47d09433fa0bb5a28bf43ae8a3
-
Filesize
100KB
MD5c57b2f70d5007e9a723c78fc96f471b9
SHA1d0c969894688544fe217d5234a7872925dd98503
SHA25695126861e1d98612ff1ae5c086fca06f13b937b637be9e2fab50bc8e97faf40e
SHA51228d1c51bab50bd5efab1b02511f9ca8e063ee17ad4b3de4b5917a4c6c1da2108b10853bbbe6a2d8c10b67f4f16a2144316accd034c05ba791e158513bad65fa7